International Symposium on Mathematics, Quantum Theory, and Cryptography

International Symposium on Mathematics, Quantum Theory, and Cryptography

Author: Tsuyoshi Takagi

Publisher: Springer Nature

Published: 2020-10-22

Total Pages: 275

ISBN-13: 981155191X

DOWNLOAD EBOOK

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.


Quantum Computing and Cryptography in Future Computers

Quantum Computing and Cryptography in Future Computers

Author: Sihare, Shyam R.

Publisher: IGI Global

Published: 2024-07-26

Total Pages: 386

ISBN-13: 1799895246

DOWNLOAD EBOOK

In recent decades, computing has undergone rapid evolutions and groundbreaking developments that affect almost every sector across the world. The developments of quantum computing and quantum cryptography are similarly revolutionizing computing and security with lasting impacts and implications. Quantum computing and quantum cryptography will pave the path for new opportunities for the future of computing. Quantum Computing and Cryptography in Future Computers discusses quantum computing and quantum cryptography principles and their impact on future computers. It includes coverage of the role of quantum computing to overcome the issues of current security methods. It also discusses the application of quantum computing in various areas like security, blockchain, and more. Covering topics such as attack detection, machine learning, and quantum key distribution, this premier reference source is an ideal resource for developers, engineers, practitioners, security experts, students and educators of higher education, librarians, researchers, and academicians.


Mathematical Modelling for Next-Generation Cryptography

Mathematical Modelling for Next-Generation Cryptography

Author: Tsuyoshi Takagi

Publisher: Springer

Published: 2017-07-25

Total Pages: 363

ISBN-13: 9811050651

DOWNLOAD EBOOK

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.


Digital Quantum Information Processing with Continuous-Variable Systems

Digital Quantum Information Processing with Continuous-Variable Systems

Author: Takaya Matsuura

Publisher: Springer Nature

Published: 2023-02-06

Total Pages: 172

ISBN-13: 9811982880

DOWNLOAD EBOOK

The book provides theoretical methods of connecting discrete-variable quantum information processing to continuous-variable one. It covers the two major fields of quantum information processing, quantum communication and quantum computation, leading to achievement of a long-sought full security of continuous-variable quantum key distribution (QKD) and proposal of a resource-efficient method for optical quantum computing. Firstly, the book provides a security of continuous-variable QKD against arbitrary attacks under a realistic condition such as finite communication rounds and the use of digitized information processing. The book also provides the unified view for conventionally used approximate Gottesman-Kitaev-Preskill (GKP) codes, which encodes qudits on a continuous-variable system, enabling direct comparison between researches based on different approximations. The book finally proposes a resource-efficient method to realize the universal optical quantum computation using the GKP code via the direct preparation of the GKP magic state instead of GKP Pauli states. Feasibility of the proposed protocol is discussed based on the existing experimental proposals for the GKP state preparation.


Post-Quantum Cryptography

Post-Quantum Cryptography

Author: Tanja Lange

Publisher: Springer

Published: 2018-04-03

Total Pages: 529

ISBN-13: 3319790633

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Code-based Cryptography; Cryptanalysis; Hash-based Cryptography; Isogenies in Cryptography; Lattice-based Cryptography; Multivariate Cryptography; Protocols; Quantum Algorithms.


Advances in Information and Computer Security

Advances in Information and Computer Security

Author: Toru Nakanishi

Publisher: Springer Nature

Published: 2021-08-26

Total Pages: 250

ISBN-13: 3030859878

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security.


Quantum Computing Since Democritus

Quantum Computing Since Democritus

Author: Scott Aaronson

Publisher: Cambridge University Press

Published: 2013-03-14

Total Pages: 403

ISBN-13: 0521199565

DOWNLOAD EBOOK

Takes students and researchers on a tour through some of the deepest ideas of maths, computer science and physics.


Mathematics of Post-quantum Cryptography

Mathematics of Post-quantum Cryptography

Author: Tsuyoshi Takagi

Publisher: Springer

Published: 2020-09-11

Total Pages: 300

ISBN-13: 9784431550150

DOWNLOAD EBOOK

This book offers an introduction to post-quantum cryptography for students, engineers and researchers in the field of information security. Above all, it describes the mathematical concepts underlying the security of post-quantum cryptographic schemes. The first part of the book provides essential background information by briefly introducing the core elements of quantum computation and presenting Shor’s algorithm, which solves the factoring problem and the discrete logarithm problem in polynomial time. In turn, the second part presents a number of candidates for post-quantum public-key encryption and digital signature schemes. The security of these schemes is based on mathematical problems in coding theory, multivariate quadratic equations, and lattices, respectively. The book provides an essential guide for students, researchers and engineers, helping them to quickly grasp this highly promising area of cryptography.